Serialization
This commit is contained in:
parent
be25b6da85
commit
c753fb7a99
@ -1,13 +1,13 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{23}{}\protected@file@percent }
|
||||||
\newlabel{App:A}{{A}{20}}
|
\newlabel{App:A}{{A}{23}}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{24}{}\protected@file@percent }
|
||||||
\newlabel{App:B}{{B}{21}}
|
\newlabel{App:B}{{B}{24}}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{24}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{24}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{A Sub-subsection in an Appendix}{24}{}\protected@file@percent }
|
||||||
\@setckpt{Appendices}{
|
\@setckpt{Appendices}{
|
||||||
\setcounter{page}{22}
|
\setcounter{page}{25}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{4}
|
\setcounter{enumi}{4}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -1,5 +1,6 @@
|
|||||||
\TUchapter{RELATED WORKS}
|
\TUchapter{RELATED WORKS}
|
||||||
|
Many authors and researchers have developed or extended attack graphs since their beginning
|
||||||
|
as attack trees. This Chapter reviews a few of their efforts as they relate to this work.
|
||||||
\TUsection{Introduction to Graph Generation}
|
\TUsection{Introduction to Graph Generation}
|
||||||
|
|
||||||
\TUsection{Improvements to Attack Graph Generation} \label{sec:related_works}
|
\TUsection{Improvements to Attack Graph Generation} \label{sec:related_works}
|
||||||
|
|||||||
50
Chapter5.aux
50
Chapter5.aux
@ -1,30 +1,36 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}\protected@file@percent }
|
\citation{cook_rage_2018}
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}\protected@file@percent }
|
\citation{li_concurrency_2019}
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{13}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task One}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{13}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{14}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}\protected@file@percent }
|
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Zero}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task One}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Two}{14}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsubsection}{Task Three}{14}{}\protected@file@percent }
|
||||||
|
\@writefile{lof}{\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{15}{}\protected@file@percent }
|
||||||
|
\newlabel{fig:RAGE_chart}{{5.1}{15}}
|
||||||
|
\@writefile{lof}{\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{16}{}\protected@file@percent }
|
||||||
|
\newlabel{fig:tasks}{{5.2}{16}}
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Task Four}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Task Five}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Communication Structure}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Worker Nodes}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Root Node}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsubsection}{Database Node}{17}{}\protected@file@percent }
|
||||||
|
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{17}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter5}{
|
\@setckpt{Chapter5}{
|
||||||
\setcounter{page}{15}
|
\setcounter{page}{18}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{4}
|
\setcounter{enumi}{4}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
@ -39,7 +45,7 @@
|
|||||||
\setcounter{subsubsection}{0}
|
\setcounter{subsubsection}{0}
|
||||||
\setcounter{paragraph}{0}
|
\setcounter{paragraph}{0}
|
||||||
\setcounter{subparagraph}{0}
|
\setcounter{subparagraph}{0}
|
||||||
\setcounter{figure}{0}
|
\setcounter{figure}{2}
|
||||||
\setcounter{table}{0}
|
\setcounter{table}{0}
|
||||||
\setcounter{lofdepth}{1}
|
\setcounter{lofdepth}{1}
|
||||||
\setcounter{lotdepth}{1}
|
\setcounter{lotdepth}{1}
|
||||||
|
|||||||
45
Chapter5.tex
45
Chapter5.tex
@ -1,13 +1,56 @@
|
|||||||
\TUchapter{IMPLEMENTATION OF MESSAGE PASSING INTERFACE}
|
\TUchapter{Utilization OF MESSAGE PASSING INTERFACE}
|
||||||
|
|
||||||
\TUsection{Introduction to MPI Utilization for Attack Graph Generation}
|
\TUsection{Introduction to MPI Utilization for Attack Graph Generation}
|
||||||
|
|
||||||
\TUsection{Necessary Components}
|
\TUsection{Necessary Components}
|
||||||
\TUsubsection{Serialization}
|
\TUsubsection{Serialization}
|
||||||
|
In order to distribute workloads across nodes in a distributed system, various
|
||||||
|
types of data will need to be sent and received. Support and mechanisms vary based
|
||||||
|
on the MPI implementation, but most fundamental data types such as integers, doubles,
|
||||||
|
characters, and Booleans are incorporated into the MPI implementation. While this does
|
||||||
|
simplify some of the messages that need to be sent and received in the MPI approaches of
|
||||||
|
attack graph generation, it does not cover the vast majority of them.
|
||||||
|
|
||||||
|
RAGE implements many custom classes and structs that are used throughout the generation process.
|
||||||
|
Qualities, topologies, network states, and exploits are a few such examples. Rather than breaking
|
||||||
|
each of these down into fundamental types manually, serialization functions are leveraged to handle
|
||||||
|
most of this. RAGE already incorporates Boost graph libraries for auxiliary support, so this work
|
||||||
|
extended this further to utilize the serialization libraries also provided by Boost. These
|
||||||
|
libraries also include support for serializing all STL classes, and many of the RAGE
|
||||||
|
classes have members that make use of the STL classes. One additional advantage of the Boost
|
||||||
|
library approach is that many of the RAGE class members are nested. For example, the NetworkState
|
||||||
|
class has a member vector of Quality classes. When serializing the NetworkState class, boost will
|
||||||
|
recursively serialize all members, including the custom class members, assuming they also have
|
||||||
|
serialization functions.
|
||||||
|
|
||||||
|
When using the serialization libraries, this work opted to use the intrusive route, where the
|
||||||
|
class instances are altered directly. This was preferable to the non-intrusive approach, since
|
||||||
|
the class instances were able to be altered with relative ease, and many of the class instances
|
||||||
|
did not expose enough information for the non-intrusive approach to be viable.
|
||||||
\TUsubsection{Data Consistency}
|
\TUsubsection{Data Consistency}
|
||||||
|
|
||||||
\TUsection{Tasking Approach}
|
\TUsection{Tasking Approach}
|
||||||
\TUsubsection{Introduction to the Tasking Approach}
|
\TUsubsection{Introduction to the Tasking Approach}
|
||||||
|
The high-level overview of the RAGE Data Flow Diagram was presented by the author of
|
||||||
|
\cite{cook_rage_2018}, and can be seen in Figure \ref{fig:RAGE_chart}. This diagram
|
||||||
|
includes an attack graph generation block that can be broken down into six main tasks.
|
||||||
|
These tasks are described in Figure \ref{fig:tasks}. Prior works such as that seen by the
|
||||||
|
authors of \cite{li_concurrency_2019} work to parallelize the attack graph generation using
|
||||||
|
OpenMP by dividing the frontier. This approach, however, utilizes Message Passing Interface (MPI)
|
||||||
|
to distribute the six tasks to examine the effect on speedup, efficiency, and scalability for
|
||||||
|
attack graph generation.
|
||||||
|
\begin{figure}[htp]
|
||||||
|
\includegraphics[width=\linewidth]{"./Chapter5_img/RAGE_Chart.png"}
|
||||||
|
\vspace{.2truein} \centerline{}
|
||||||
|
\caption{Generation Flowchart of RAGE}
|
||||||
|
\label{fig:RAGE_chart}
|
||||||
|
\end{figure}
|
||||||
|
\begin{figure}[htp]
|
||||||
|
\includegraphics[width=\linewidth]{"./Chapter5_img/horiz_task.drawio.png"}
|
||||||
|
\vspace{.2truein} \centerline{}
|
||||||
|
\caption{Task Overview of the Attack Graph Generation Process}
|
||||||
|
\label{fig:tasks}
|
||||||
|
\end{figure}
|
||||||
|
|
||||||
\TUsubsection{Algorithm Design}
|
\TUsubsection{Algorithm Design}
|
||||||
\TUsubsubsection{Communication Structure}
|
\TUsubsubsection{Communication Structure}
|
||||||
|
|||||||
BIN
Chapter5_img/RAGE_Chart.png
Normal file
BIN
Chapter5_img/RAGE_Chart.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 51 KiB |
BIN
Chapter5_img/RAGE_Flowchart.png
Normal file
BIN
Chapter5_img/RAGE_Flowchart.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 23 KiB |
BIN
Chapter5_img/horiz_task.drawio.png
Normal file
BIN
Chapter5_img/horiz_task.drawio.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 142 KiB |
BIN
Chapter5_img/subgraphing.drawio.png
Normal file
BIN
Chapter5_img/subgraphing.drawio.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 61 KiB |
36
Chapter6.aux
36
Chapter6.aux
@ -1,23 +1,23 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.1}\bf Small Networks}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.2}\it Results}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.2}\bf Large Networks}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.2}\it Results}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.2}\it Results}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{18}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{19}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.2}\it Results}{19}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{19}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter6}{
|
\@setckpt{Chapter6}{
|
||||||
\setcounter{page}{17}
|
\setcounter{page}{20}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{4}
|
\setcounter{enumi}{4}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -1,8 +1,8 @@
|
|||||||
\relax
|
\relax
|
||||||
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{20}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\numberline {7.1}\bf Future Work}{20}{}\protected@file@percent }
|
||||||
\@setckpt{Chapter7}{
|
\@setckpt{Chapter7}{
|
||||||
\setcounter{page}{18}
|
\setcounter{page}{21}
|
||||||
\setcounter{equation}{0}
|
\setcounter{equation}{0}
|
||||||
\setcounter{enumi}{4}
|
\setcounter{enumi}{4}
|
||||||
\setcounter{enumii}{0}
|
\setcounter{enumii}{0}
|
||||||
|
|||||||
@ -31,12 +31,12 @@
|
|||||||
\bibcite{phillips_graph-based_1998}{8}
|
\bibcite{phillips_graph-based_1998}{8}
|
||||||
\bibcite{schneier_modeling_1999}{9}
|
\bibcite{schneier_modeling_1999}{9}
|
||||||
\@writefile{toc}{{\hfill \ }}
|
\@writefile{toc}{{\hfill \ }}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}\protected@file@percent }
|
||||||
\@writefile{toc}{\addvspace {10pt}}
|
\@writefile{toc}{\addvspace {10pt}}
|
||||||
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}\protected@file@percent }
|
\@writefile{toc}{\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}\protected@file@percent }
|
||||||
\@writefile{toc}{{\hfill \ }}
|
\@writefile{toc}{{\hfill \ }}
|
||||||
\bibcite{sheyner_automated_2002}{10}
|
\bibcite{sheyner_automated_2002}{10}
|
||||||
\bibcite{zhang_boosting_2017}{11}
|
\bibcite{zhang_boosting_2017}{11}
|
||||||
\bibstyle{plain}
|
\bibstyle{plain}
|
||||||
\@input{Appendices.aux}
|
\@input{Appendices.aux}
|
||||||
\gdef \@abspage@last{31}
|
\gdef \@abspage@last{34}
|
||||||
|
|||||||
@ -1,3 +1,5 @@
|
|||||||
{\vspace {\baselineskip }}
|
{\vspace {\baselineskip }}
|
||||||
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}%
|
\contentsline {figure}{\numberline {3.1}{\ignorespaces Path Walking to State 14}}{5}{}%
|
||||||
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}%
|
\contentsline {figure}{\numberline {3.2}{\ignorespaces Color Coding a Small Network Based on Violations}}{7}{}%
|
||||||
|
\contentsline {figure}{\numberline {5.1}{\ignorespaces Generation Flowchart of RAGE}}{15}{}%
|
||||||
|
\contentsline {figure}{\numberline {5.2}{\ignorespaces Task Overview of the Attack Graph Generation Process}}{16}{}%
|
||||||
|
|||||||
@ -1,8 +1,8 @@
|
|||||||
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 26 FEB 2022 17:08
|
This is pdfTeX, Version 3.141592653-2.6-1.40.23 (TeX Live 2021/Arch Linux) (preloaded format=pdflatex 2022.2.14) 27 FEB 2022 19:57
|
||||||
entering extended mode
|
entering extended mode
|
||||||
restricted \write18 enabled.
|
restricted \write18 enabled.
|
||||||
%&-line parsing enabled.
|
%&-line parsing enabled.
|
||||||
**Schrick-Noah_MS-Thesis.tex
|
**Schrick-Noah_MS-Thesis
|
||||||
(./Schrick-Noah_MS-Thesis.tex
|
(./Schrick-Noah_MS-Thesis.tex
|
||||||
LaTeX2e <2021-11-15> patch level 1
|
LaTeX2e <2021-11-15> patch level 1
|
||||||
L3 programming layer <2021-11-22>
|
L3 programming layer <2021-11-22>
|
||||||
@ -254,39 +254,52 @@ CHAPTER 5.
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
]) [14]
|
]
|
||||||
|
<./Chapter5_img/RAGE_Chart.png, id=83, 495.8525pt x 557.08125pt>
|
||||||
|
File: ./Chapter5_img/RAGE_Chart.png Graphic file (type png)
|
||||||
|
<use ./Chapter5_img/RAGE_Chart.png>
|
||||||
|
Package pdftex.def Info: ./Chapter5_img/RAGE_Chart.png used on input line 43.
|
||||||
|
(pdftex.def) Requested size: 469.75499pt x 527.76213pt.
|
||||||
|
<./Chapter5_img/horiz_task.drawio.png, id=84, 1125.20375pt x 738.76pt>
|
||||||
|
File: ./Chapter5_img/horiz_task.drawio.png Graphic file (type png)
|
||||||
|
<use ./Chapter5_img/horiz_task.drawio.png>
|
||||||
|
Package pdftex.def Info: ./Chapter5_img/horiz_task.drawio.png used on input li
|
||||||
|
ne 49.
|
||||||
|
(pdftex.def) Requested size: 469.75499pt x 308.4171pt.
|
||||||
|
[14] [15 <./Chapter5_img/RAGE_Chart.png>] [16 <./Chapter5_img/horiz_task.drawi
|
||||||
|
o.png>]) [17]
|
||||||
\openout2 = `Chapter6.aux'.
|
\openout2 = `Chapter6.aux'.
|
||||||
|
|
||||||
(./Chapter6.tex
|
(./Chapter6.tex
|
||||||
CHAPTER 6.
|
CHAPTER 6.
|
||||||
[15
|
[18
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
]) [16]
|
]) [19]
|
||||||
\openout2 = `Chapter7.aux'.
|
\openout2 = `Chapter7.aux'.
|
||||||
|
|
||||||
(./Chapter7.tex
|
(./Chapter7.tex
|
||||||
CHAPTER 7.
|
CHAPTER 7.
|
||||||
) [17
|
) [20
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
] (./Schrick-Noah_MS-Thesis.bbl [18
|
] (./Schrick-Noah_MS-Thesis.bbl [21
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
])
|
])
|
||||||
\c@appendixno=\count269
|
\c@appendixno=\count269
|
||||||
[19]
|
[22]
|
||||||
\openout2 = `Appendices.aux'.
|
\openout2 = `Appendices.aux'.
|
||||||
|
|
||||||
(./Appendices.tex [20
|
(./Appendices.tex [23
|
||||||
|
|
||||||
])
|
])
|
||||||
[21] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
|
[24] (./Schrick-Noah_MS-Thesis.aux (./Chapter1.aux) (./Chapter2.aux)
|
||||||
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
|
(./Chapter3.aux) (./Chapter4.aux) (./Chapter5.aux) (./Chapter6.aux)
|
||||||
(./Chapter7.aux) (./Appendices.aux)) )
|
(./Chapter7.aux) (./Appendices.aux)) )
|
||||||
(\end occurred inside a group at level 6)
|
(\end occurred inside a group at level 6)
|
||||||
@ -299,23 +312,23 @@ CHAPTER 7.
|
|||||||
### semi simple group (level 1) entered at line 52 (\begingroup)
|
### semi simple group (level 1) entered at line 52 (\begingroup)
|
||||||
### bottom level
|
### bottom level
|
||||||
Here is how much of TeX's memory you used:
|
Here is how much of TeX's memory you used:
|
||||||
2129 strings out of 478353
|
2148 strings out of 478353
|
||||||
37349 string characters out of 5854635
|
37971 string characters out of 5854635
|
||||||
344903 words of memory out of 5000000
|
344925 words of memory out of 5000000
|
||||||
20202 multiletter control sequences out of 15000+600000
|
20218 multiletter control sequences out of 15000+600000
|
||||||
407157 words of font info for 39 fonts, out of 8000000 for 9000
|
407157 words of font info for 39 fonts, out of 8000000 for 9000
|
||||||
1141 hyphenation exceptions out of 8191
|
1141 hyphenation exceptions out of 8191
|
||||||
55i,7n,62p,310b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s
|
55i,7n,62p,306b,1305s stack positions out of 5000i,500n,10000p,200000b,80000s
|
||||||
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
|
{/usr/share/texmf-dist/fonts/enc/dvips/cm-super/cm-super-ts1.en
|
||||||
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
|
c}</usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/cmbx12.pfb></usr/share/
|
||||||
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
|
texmf-dist/fonts/type1/public/amsfonts/cm/cmmi12.pfb></usr/share/texmf-dist/fon
|
||||||
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
|
ts/type1/public/amsfonts/cm/cmr12.pfb></usr/share/texmf-dist/fonts/type1/public
|
||||||
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
/amsfonts/cm/cmsy10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfonts/cm/c
|
||||||
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
|
mti12.pfb></usr/share/texmf-dist/fonts/type1/public/cm-super/sfrm1200.pfb>
|
||||||
Output written on Schrick-Noah_MS-Thesis.pdf (31 pages, 211425 bytes).
|
Output written on Schrick-Noah_MS-Thesis.pdf (34 pages, 338284 bytes).
|
||||||
PDF statistics:
|
PDF statistics:
|
||||||
137 PDF objects out of 1000 (max. 8388607)
|
150 PDF objects out of 1000 (max. 8388607)
|
||||||
89 compressed objects within 1 object stream
|
96 compressed objects within 1 object stream
|
||||||
0 named destinations out of 1000 (max. 500000)
|
0 named destinations out of 1000 (max. 500000)
|
||||||
11 words of extra memory for PDF output out of 10000 (max. 10000000)
|
21 words of extra memory for PDF output out of 10000 (max. 10000000)
|
||||||
|
|
||||||
|
|||||||
Binary file not shown.
@ -35,56 +35,56 @@
|
|||||||
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}%
|
\contentsline {section}{\numberline {4.3}\bf Example Networks and Results}{12}{}%
|
||||||
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}%
|
\contentsline {subsection}{\numberline {4.3.1}\it Example Networks}{12}{}%
|
||||||
\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}%
|
\contentsline {subsection}{\numberline {4.3.2}\it Results}{12}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {IMPLEMENTATION OF MESSAGE PASSING INTERFACE}}}{13}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 5: }{\bf \uppercase {Utilization OF MESSAGE PASSING INTERFACE}}}{13}{}%
|
||||||
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}%
|
\contentsline {section}{\numberline {5.1}\bf Introduction to MPI Utilization for Attack Graph Generation}{13}{}%
|
||||||
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}%
|
\contentsline {section}{\numberline {5.2}\bf Necessary Components}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}%
|
\contentsline {subsection}{\numberline {5.2.1}\it Serialization}{13}{}%
|
||||||
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{13}{}%
|
\contentsline {subsection}{\numberline {5.2.2}\it Data Consistency}{14}{}%
|
||||||
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{13}{}%
|
\contentsline {section}{\numberline {5.3}\bf Tasking Approach}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{13}{}%
|
\contentsline {subsection}{\numberline {5.3.1}\it Introduction to the Tasking Approach}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{13}{}%
|
\contentsline {subsection}{\numberline {5.3.2}\it Algorithm Design}{14}{}%
|
||||||
\contentsline {subsubsection}{Communication Structure}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task Zero}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task One}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task Two}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task Three}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task Four}{13}{}%
|
|
||||||
\contentsline {subsubsection}{Task Five}{14}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{14}{}%
|
|
||||||
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{14}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{14}{}%
|
|
||||||
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{14}{}%
|
|
||||||
\contentsline {subsubsection}{Communication Structure}{14}{}%
|
\contentsline {subsubsection}{Communication Structure}{14}{}%
|
||||||
\contentsline {subsubsection}{Worker Nodes}{14}{}%
|
\contentsline {subsubsection}{Task Zero}{14}{}%
|
||||||
\contentsline {subsubsection}{Root Node}{14}{}%
|
\contentsline {subsubsection}{Task One}{14}{}%
|
||||||
\contentsline {subsubsection}{Database Node}{14}{}%
|
\contentsline {subsubsection}{Task Two}{14}{}%
|
||||||
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{14}{}%
|
\contentsline {subsubsection}{Task Three}{14}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{15}{}%
|
\contentsline {subsubsection}{Task Four}{17}{}%
|
||||||
\contentsline {section}{\numberline {6.1}\bf Small Networks}{15}{}%
|
\contentsline {subsubsection}{Task Five}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{15}{}%
|
\contentsline {subsection}{\numberline {5.3.3}\it Performance Expectations}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.2}\it Results}{15}{}%
|
\contentsline {section}{\numberline {5.4}\bf Subgraphing Approach}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{15}{}%
|
\contentsline {subsection}{\numberline {5.4.1}\it Introduction to the Subgraphing Approach}{17}{}%
|
||||||
\contentsline {section}{\numberline {6.2}\bf Large Networks}{15}{}%
|
\contentsline {subsection}{\numberline {5.4.2}\it Algorithm Design}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{15}{}%
|
\contentsline {subsubsection}{Communication Structure}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.2}\it Results}{15}{}%
|
\contentsline {subsubsection}{Worker Nodes}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{15}{}%
|
\contentsline {subsubsection}{Root Node}{17}{}%
|
||||||
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{15}{}%
|
\contentsline {subsubsection}{Database Node}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{15}{}%
|
\contentsline {subsection}{\numberline {5.4.3}\it Performance Expectations}{17}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.2}\it Results}{15}{}%
|
\contentsline {chapter}{\numberline {CHAPTER 6: }{\bf \uppercase {PERFORMANCE ANALYSIS}}}{18}{}%
|
||||||
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{15}{}%
|
\contentsline {section}{\numberline {6.1}\bf Small Networks}{18}{}%
|
||||||
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{15}{}%
|
\contentsline {subsection}{\numberline {6.1.1}\it Test Information}{18}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{16}{}%
|
\contentsline {subsection}{\numberline {6.1.2}\it Results}{18}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.2}\it Results}{16}{}%
|
\contentsline {subsection}{\numberline {6.1.3}\it Analysis}{18}{}%
|
||||||
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{16}{}%
|
\contentsline {section}{\numberline {6.2}\bf Large Networks}{18}{}%
|
||||||
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{17}{}%
|
\contentsline {subsection}{\numberline {6.2.1}\it Test Information}{18}{}%
|
||||||
\contentsline {section}{\numberline {7.1}\bf Future Work}{17}{}%
|
\contentsline {subsection}{\numberline {6.2.2}\it Results}{18}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.2.3}\it Analysis}{18}{}%
|
||||||
|
\contentsline {section}{\numberline {6.3}\bf Large Exploit Lists}{18}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.1}\it Test Information}{18}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.2}\it Results}{18}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.3.3}\it Analysis}{18}{}%
|
||||||
|
\contentsline {section}{\numberline {6.4}\bf Distributed Hash Tables}{18}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.1}\it Test Information}{19}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.2}\it Results}{19}{}%
|
||||||
|
\contentsline {subsection}{\numberline {6.4.3}\it Analysis}{19}{}%
|
||||||
|
\contentsline {chapter}{\numberline {CHAPTER 7: }{\bf \uppercase {CONCLUSIONS AND FUTURE WORKS}}}{20}{}%
|
||||||
|
\contentsline {section}{\numberline {7.1}\bf Future Work}{20}{}%
|
||||||
{\hfill \ }
|
{\hfill \ }
|
||||||
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{18}{}%
|
\contentsline {section}{\hspace {-\parindent }NOMENCLATURE}{21}{}%
|
||||||
\addvspace {10pt}
|
\addvspace {10pt}
|
||||||
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{18}{}%
|
\contentsline {section}{\hspace {-\parindent }BIBLIOGRAPHY}{21}{}%
|
||||||
{\hfill \ }
|
{\hfill \ }
|
||||||
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{20}{}%
|
\contentsline {section}{\hspace {-\parindent }APPENDIX A:\ \ {\bf \uppercase {THE FIRST APPENDIX}} }{23}{}%
|
||||||
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{21}{}%
|
\contentsline {section}{\hspace {-\parindent }APPENDIX B:\ \ {\bf \uppercase {THE SECOND APPENDIX}} }{24}{}%
|
||||||
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{21}{}%
|
\contentsline {section}{\numberline {B.1}\bf A Heading in an Appendix}{24}{}%
|
||||||
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{21}{}%
|
\contentsline {subsection}{\numberline {B.1.1}\it A Subheading in an Appendix}{24}{}%
|
||||||
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{21}{}%
|
\contentsline {subsubsection}{A Sub-subsection in an Appendix}{24}{}%
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user